CVE-2022-48673
Public on 2024-05-03
Modified on 2024-05-18
Description
In the Linux kernel, the following vulnerability has been resolved: net/smc: Fix possible access to freed memory in link clear After modifying the QP to the Error state, all RX WR would be completed with WC in IB_WC_WR_FLUSH_ERR status. Current implementation does not wait for it is done, but destroy the QP and free the link group directly. So there is a risk that accessing the freed memory in tasklet context.
Severity
CVSS v3 Base Score
See breakdown
Affected Packages
Platform | Package | Release Date | Advisory | Status |
---|---|---|---|---|
Amazon Linux 1 | kernel | Pending Fix | ||
Amazon Linux 2 - Core | kernel | Pending Fix | ||
Amazon Linux 2 - Kernel-5.10 Extra | kernel | Pending Fix | ||
Amazon Linux 2 - Kernel-5.15 Extra | kernel | Pending Fix | ||
Amazon Linux 2 - Kernel-5.4 Extra | kernel | Pending Fix | ||
Amazon Linux 2023 | kernel | Not Affected |
CVSS Scores
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 5.5 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
NVD | CVSSv3 | 5.5 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |